Details of University of Maryland IFSM 201 Week 3 Quiz
Note: It is recommended that you save your response as you complete each
... [Show More] question.
________________________________________
Question 1 (0.25 points)
Which of the following would not be counted in a list of goals for having and using a knowledge management system (KMS):
Question 1 options:
Facilitating better, more informed decisions
Stimulating cultural change and innovation
Utilizing information technology to manage data and information
Impacting performance across an organization
Building knowledge that can be used to streamline operations and improve processes.
Save
Question 2 (0.25 points)
(True/False).The sources for the data that is the foundation for knowledge management within a business come solely from within the business itself.
Question 2 options:
True
False
Save
________________________________________
Question 3 (0.25 points)
Which is the largest component found inside a field?
Question 3 options:
Bits
Characters
Records
Tables
Save
Question 4 (0.25 points)
True or false? Tables are composed of fields, and fields are composed of records.
Question 4 options:
A) True
B) False
Save
________________________________________
Question 5 (0.25 points)
What is the software called that allows the user to create, access, and manage a database?
Question 5 options:
A) DLP
B) DBMS
C) OO model
D) Relational Model
Save
Question 6 (0.25 points)
What are procedures that help keep a database current?
Question 6 options:
A) Database query procedures
B) Report generation procedures
C) File maintenance procedures
D) Data entry procedures
Save
Question 7 (0.25 points)
Does a database entry form allow the user to enter or modify data in the records? Select Yes or No.
Question 7 options:
A) Yes
B) No
Save
________________________________________
Question 8 (0.25 points)
What is one advantage of using a relational database over a spreadsheet or flat file to store data?
Question 8 options:
A) It allows for reduced complexity in the design and implementation.
B) It enables reduced memory and storage allocation.
C) It reduces data redundancy.
D) It reduces risk of unauthorized access to the data.
Save
________________________________________
Question 9 (0.25 points)
Which of the following would be an example of a loss of availability to records within a database?
Question 9 options:
A) A classmate tells you that she could see your grades—not just her own—posted in the class's roster.
B) You do a lot of banking online. Today, when you attempted to log in to your account, your valid ID and password are denied, and you cannot get access to your accounts.
C) Your favorite online shopping site suddenly begins displaying a different mailing address than the one you use. You know you have not made any changes to your account profile.
D) You are applying for a new credit card and the company indicates that they will be checking your credit score at one of the three primary credit reporting companies.
Save
________________________________________
Question 10 (0.25 points)
If a patch is required to address a potential loophole in the security of a database, this would be considered a potential security __________.
Question 10 options:
A) threat
B) vulnerability
Save
________________________________________
Question 11 (0.25 points)
Your network administrator finds a virus has been successfully inserted into the network software. The virus itself is now consider a ______ the network and to the users who must access the network.
Question 11 options:
threat to
vulnerability of
Save
________________________________________
Question 12 (0.25 points)
An e-mail message to all the members of your department asks each person to reply to the sender with data on his or her recent sales figures. This is data that is normally not shared with others in the department. You accidentally hit the Reply All button instead of replying to just the sender. Which of the following best describes the data issue at play in this situation?
Question 12 options:
A) Accidental data loss
B) Accidental data leak
C) Intentional data loss
D) Intentional data leak
Save
Question 13 (0.25 points)
Joachim is frustrated at a lack of job advancement opportunities at his current job. Before resigning, he deletes a set of data records that cannot be restored because there is no database backup procedure in place. Which of the following best describes this data issue?
Question 13 options:
A) Intentional malicious data loss
B) Intentional malicious data leak
C) Accidental malicious data loss
D) Accidental malicious data leak
Save
________________________________________
Question 14 (0.25 points)
(True/False). Because you have made it a practice to never access the internet while your personal database is open, you can rest assured that your database would likely not be vulnerable to any compromises.
Question 14 options:
A) True
B) False
Save
Question 15 (0.25 points)
(True/False). If you are the only user of your personal computer, it is not necessary to perform a risk assessment to identify any vulnerabilities related to your personal database.
Question 15 options:
A) True
B) False
Save
________________________________________
Question 16 (0.25 points)
(True/False). You cannot format the data in an Excel spreadsheet to look like a table.
Question 16 options:
True
False
Save
Question 17 (0.25 points)
(True/False). Once an Excel table has been inserted into your spreadsheet, you are not able to modify the data entered into that table.
Question 17 options:
True
False
Save
Question 18 (0.25 points)
Excel allows you to add chart elements—such as chart titles, legends, and data labels—to make your chart easier to read. To add a chart element, you click the Add Chart Element command on the:
Question 18 options:
Design tab
Format tab.
View tab.
Save
________________________________________
Question 19 (0.25 points)
When creating a named range in Excel, which of the following rules applies:
Question 19 options:
The first character of a name can be any character.
A named range can consist of any single character.
The name may include spaces.
The length of name is restricted to 255 characters.
Save
________________________________________
Question 20 (0.25 points)
Which of the following is a valid named range in Excel:
Question 20 options:
%ABCE
C
My Named Range
AVGCosts
Save
________________________________________ [Show Less]